Fault injection as an oscilloscope: Fault correlation analysis

被引:0
|
作者
Spruyt A. [1 ]
Milburn A. [1 ]
Chmielewski Ł. [2 ]
机构
[1] Vrije Universiteit Amsterdam, Amsterdam
[2] Radboud University, Nijmegen
来源
| 1600年 / Ruhr-University of Bochum卷 / 2021期
基金
欧盟地平线“2020”;
关键词
Correlation Power Analysis; Fault Injection; Fault Propagation; Side-Channel Analysis;
D O I
10.46586/tches.v2021.i1.192-216
中图分类号
学科分类号
摘要
Fault Injection (FI) attacks have become a practical threat to modern cryptographic implementations. Such attacks have recently focused more on exploita-tion of implementation-centric and device-specific properties of the faults. In this paper, we consider the parallel between SCA attacks and FI attacks; specifically, that many FI attacks rely on the data-dependency of activation and propagation of a fault, and SCA attacks similarly rely on data-dependent power usage. In fact, these are so closely related that we show that existing SCA attacks can be directly applied in a purely FI setting, by translating power FI results to generate FI ‘probability traces’ as an analogue of power traces. We impose only the requirements of the equivalent SCA attack (e.g., knowledge of the input plaintext for CPA on the first round), along with a way to observe the status of the target (whether or not it has failed and been “muted” after a fault). We also analyse existing attacks such as Fault Template Analysis in the light of this parallel, and discuss the limitations of our methodology. To demonstrate that our attacks are practical, we first show that SPA can be used to recover RSA private exponents using FI attacks. Subsequently, we show the generic nature of our attacks by performing DPA on AES after applying FI attacks to several different targets (with AVR, 32-bit ARM and RISC-V CPUs), using different software on each target, and do so with a low-cost (i.e., less than $50) power fault injection setup. We call this technique Fault Correlation Analysis (FCA), since we perform CPA on fault probability traces. To show that this technique is not limited to software, we also present FCA results against the hardware AES engine supported by one of our targets. Our results show that even without access to the ciphertext (e.g., where an FI redundancy countermeasure is in place, or where ciphertext is simply not exposed to an attacker in any circumstance) and in the presence of light jitter, FCA attacks can successfully recover keys on each of these targets. © 2020, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:192 / 216
页数:24
相关论文
共 50 条
  • [1] Fault analysis and fault correlation in seismic section
    Shiyou Diqiu Wuli Kantan, 5 (560-568):
  • [2] Quantitative Fault Injection Analysis
    Feldtkeller, Jakob
    Gueneysu, Tim
    Schaumont, Patrick
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT IV, 2023, 14441 : 302 - 336
  • [3] A fault model for fault injection analysis of dynamic UML specifications
    Ammar, HH
    Yacoub, SM
    Ibrahim, A
    12TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2001, : 74 - 83
  • [4] Fault localization of power-ground short via signal injection and oscilloscope technique
    Binh Nguyen
    ISTFA 2010: CONFERENCE PROCEEDINGS FROM THE 36TH INTERNATIONAL SYMPOSIUM FOR TESTING AND FAILURE ANALYSIS, 2010, : 202 - 205
  • [5] Finding fault with fault injection: an empirical exploration of distortion in fault injection experiments
    Erik van der Kouwe
    Cristiano Giuffrida
    Andrew S. Tanenbaum
    Software Quality Journal, 2016, 24 : 7 - 36
  • [6] Finding fault with fault injection: an empirical exploration of distortion in fault injection experiments
    van der Kouwe, Erik
    Giuffrida, Cristiano
    Tanenbaum, Andrew S.
    SOFTWARE QUALITY JOURNAL, 2016, 24 (01) : 7 - 36
  • [7] Research on the Choice of Fault Injection Point in Fault Injection
    Chang Qing
    ISTM/2011: 9TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, 2011, : 156 - 160
  • [8] Differential Fault Analysis for Round-Reduced AES by Fault Injection
    Park, JeaHoon
    Moon, SangJae
    Choi, DooHo
    Kang, YouSung
    Ha, JaeCheol
    ETRI JOURNAL, 2011, 33 (03) : 434 - 442
  • [9] Fault Model Analysis of DRAM under Electromagnetic Fault Injection Attack
    Liu, Qiang
    Guo, Longtao
    Tang, Honghui
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [10] VHDL testability analysis based on fault clustering and implicit fault injection
    Bietti, FS
    Ferrandi, F
    Fummi, F
    Sciuto, D
    PROCEEDINGS OF THE 8TH GREAT LAKES SYMPOSIUM ON VLSI, 1998, : 237 - 242